Sciweavers

490 search results - page 5 / 98
» A New Public-Key Cryptosystem
Sort
View
CORR
2008
Springer
187views Education» more  CORR 2008»
14 years 11 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
15 years 3 months ago
Proposal of a Signature Scheme Based on STS Trapdoor
A New digital signature scheme based on Stepwise Triangular Scheme (STS) is proposed. The proposed trapdoor has resolved the vulnerability of STS and secure against both Gr¨obner ...
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, ...
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 11 months ago
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 5 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
INFORMATICALT
2010
148views more  INFORMATICALT 2010»
14 years 9 months ago
A Novel Combinatorial Public Key Cryptosystem
Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptograp...
Baocang Wang, Yupu Hu